The Secondary Logon Service in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold and 1511 does not properly process request handles, which allows local users to gain privileges via a crafted application, aka "Secondary Logon Elevation of Privilege Vulnerability."
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/84034 | Broken Link Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1035210 | Broken Link Third Party Advisory VDB Entry |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-032 | Patch Vendor Advisory |
https://www.exploit-db.com/exploits/39574/ | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/39719/ | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/39809/ | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/40107/ | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2016-03-09 11:59
Updated : 2024-07-24 14:28
NVD link : CVE-2016-0099
Mitre link : CVE-2016-0099
CVE.ORG link : CVE-2016-0099
JSON object : View
Products Affected
microsoft
- windows_10_1507
- windows_8.1
- windows_server_2012
- windows_vista
- windows_10_1511
- windows_7
- windows_server_2008
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')